Similar publications

Article
Full-text available
The amount of data has increased recently, motivating the introduction of advanced data engineering solutions in the cloud. The current paper aims to discuss the development of secure and highly scalable SIEM systems and their integration with AI and ML forms. The main goal is to improve the functionalities of the SIEM systems in processing, analyz...
Article
Full-text available
Many companies are now workingto converge business models and engineering processes with the technologies of the fourth industrial revolution. The automation of industrial processes together with the implementationof infrastructure,makes it possible to interconnect people and performance indicators in real-time, reducing the decision-making time an...

Citations

... As per Miloslavskaya (2022), the retail sector is a treasure trove of customer data, making it a captivating target for cyber-attackers to abuse or sell confidential information. Data breaches not only culminate in financial losses but also destroy a retailer's reputation. ...
... Smart contracts, designed to deploy instantly when specific conditionalities are met, diminish the need for mediators in transactions and agreements. This computerization not only elevates processes but also minimizes the costs related to compliance and manual verification (Miloslavskaya et al, 2022). In the supply chain, blockchain's capability to offer real-time visibility into the transportation of goods enhances overall efficiency, diminishes delays, and reduces errors. ...
Article
Full-text available
Blockchain technology has proven a powerful tool for reinforcing cybersecurity in the retail sector. This research offers an extensive overview of the applications of blockchain in retail cybersecurity, particularly, underscoring supply chain integrity, data protection, and transaction security. The research explored how blockchain can facilitate provenance and traceability well as prevent counterfeiting and enhance vendor management in the supply chain. It also explores how blockchain-based payment frameworks and fraud detection systems can boost transaction security. Moreover, the study assesses the capability of blockchain to safeguard data via privacy and consent management, and secure and immutable data storage. The findings outline the capability of blockchain technology to diminish risks, enhance transparency, and affirm trust in retail cybersecurity. While challenges are inevitable, such as regulatory and scalability considerations, the research infers that blockchain technology presents noteworthy opportunities for innovation and advancement in the retail industry's cybersecurity landscape. | KEYWORDS
... Online payments, currency exchanges, and using a digital wallet to pay for goods and services are some examples of financial application domains. Examples of non-financial application domains are digital identity management, authentication and authorization, management of medical records, and digital content storage and delivery systems (Miloslavskaya, Tolstoy, Budzko, & Das, 2019). Another example is the application of new technologies that can be used to supervise the collection of payments utilising a widespread Bitcoin digital wallet for customers and retailers (Chen, Jiang, & Wang, 2017). ...
Article
Full-text available
Blockchain represented the second era of internet and has the potential in addressing various challenges towards strengthening the economy including Islamic finance. Zakat institutions, which are non-bank financial institutions, supplement bank operations in carrying out tasks for economic growth aimed at eradicating poverty, promoting social justice, and distributing revenue fairly. Although the immutability, security, and transparency of blockchain may entice Islamic financial institutions to adopt it for their operations, adoption, and behavioural intention of halal blockchain digital wallet in non-bank financial institutions like zakat institutions, are still unknown. Islamic non-bank financial institutions like zakat are under pressure due to the expanding deployment of blockchain technology today and the growing awareness of its potential. The purpose of this research is to examine the feasibility of using a survey instrument from pilot study to determine the level of blockchain knowledge awareness among zakat payers. The study employs a quantitative method using a survey questionnaire and a simple random sampling was administered among zakat payers to achieve the purpose. The questionnaires were distributed at random to zakat payers. The results show that internal consistency among the items was high. Majority of respondents were completely unaware of cryptocurrencies because they have never transacted with it before, and even though majority of the respondents had a fair amount of understanding about blockchain technology and cryptocurrencies, they had no experience carrying out bitcoin transactions. The instruments from this study can be utilised for future actual survey on a larger scale.
Article
Blockchain Technology (BT) involves maintaining a special log (or register of records), the amount of information in which increases with each new record. Maintaining such a registry in high-load systems, in which several thousand (or more) records can be added per second, creates a serious problem of storing such a volume of information. There are also cases, in which the blockchain security features, and in particular its immutable data storage, are a drawback. For instance, once stored in the blockchain, erroneous data cannot be removed. To solve this problem, it is possible to use the redactable BT (RBT). In this case, one can clear the registry of outdated (or unnecessary) information that is no longer suitable for solving the tasks assigned to the system. However, this issue has its own subtleties, features and rules for working with this technology. Therefore, the purpose of the paper is to identify the actual problems of the RBT usage.
Chapter
Nowadays technologies such as Blockchain (BC) and the Internet of Things (IoT) can be heard everywhere. But because of the leap in the development of these technologies, there is a need to evaluate the existing approaches critically. One of the up-to-date tasks is to study information security (IS) incidents as a part of the IoT. Due to a large number of different manufacturers and options for technology implementation, it cannot be unambiguously concluded what choice will be better. The paper examines the related work in the area and proposes an approach to form the basis for storing data on IS incidents. For this purpose, the authors formulate a block structure for including in a chain for later use, for example, in computer forensics.